General
-
Target
file.exe
-
Size
214KB
-
Sample
221217-3wpw3sda3t
-
MD5
c1be0d5de42908e9a62b94a46dcc17ce
-
SHA1
c2e3a40bd903682f5b971a5bd7c7af3c88ae0981
-
SHA256
f378d08ccdf697a50548e7d9bd56f102ffadd88f3306b7253f803e3047303829
-
SHA512
80be552b2f2de1aed5cd1bb14241dbdd4274bc0a726ab33f42a5fad174d4c33637b74a25c38188bee1080b647ec33499768e20fa119c7d0349832672f78dbb34
-
SSDEEP
3072:S3Nms4LLuOPZwRop1prfy61HPP7oPUVVEGLSkO8/g3xomDMrG3ERWR3Le:eNmhLLuOPn+gHPSUvEGmkTg3Co5U0V6
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Malware Config
Extracted
danabot
23.236.181.126:443
123.253.35.251:443
66.85.173.3:443
-
embedded_hash
8F56CD73F6B5CD5D7B17B0BA61E70A82
-
type
loader
Targets
-
-
Target
file.exe
-
Size
214KB
-
MD5
c1be0d5de42908e9a62b94a46dcc17ce
-
SHA1
c2e3a40bd903682f5b971a5bd7c7af3c88ae0981
-
SHA256
f378d08ccdf697a50548e7d9bd56f102ffadd88f3306b7253f803e3047303829
-
SHA512
80be552b2f2de1aed5cd1bb14241dbdd4274bc0a726ab33f42a5fad174d4c33637b74a25c38188bee1080b647ec33499768e20fa119c7d0349832672f78dbb34
-
SSDEEP
3072:S3Nms4LLuOPZwRop1prfy61HPP7oPUVVEGLSkO8/g3xomDMrG3ERWR3Le:eNmhLLuOPn+gHPSUvEGmkTg3Co5U0V6
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-